Appeal 2007-0645 Application 10/242,898 1 2 through 5, 13 through 17, and 19 through 24. In accordance with 37 C.F.R. 2 § 41.37(c)(1)(vii) we group all of the rejected claims together, and we will treat the 3 claims as one group and select claim 1 as representative of the group. 4 The Appellants’ contention presents us with the issue of whether Sitka 5 teaches the claim limitation of “a document vault database coupled to the web 6 server, the document vault database storing information regarding whether a user is 7 authorized to access a document file.” 8 9 FINDINGS OF FACT 10 Sitka teaches a system for storing data on a server. (col. 28, ll. 3-12). The 11 server can be accessed through the internet via a web server. (See for example 12 figure 8). The system makes use of a Directed Storage Management (DSM) system 13 to access data in a database and to provide the data to the user over the web. (col. 14 8, ll. 14-20 and col. 29, l. 64 through col. 30, l. 30) The DSM performs security 15 features such as verifying passwords and determines which store and files the user 16 has access to. (col. 12, ll. 39-58). Sitka states in column 13, ll. 45-50: 17 When a user connects to DSM system 10, his Logon and password are 18 verified, and his ActiveGroup ID is set to the User’s Default GroupID. The 19 Stores that the user can access and the permissions for those Stores are 20 obtained once from the GroupMember and StoreAnalysis tables and cached 21 by DSM system 10 for the open connections. 22 23 We find the GroupMember and StoreAnalysis tables to be a form of a database that 24 contains information regarding user authorization to access files. Further, Sitka 25 teaches that algorithms are employed to determine permissions for file access. 26 (col. 14, ll. 1-9). 27 28 4Page: Previous 1 2 3 4 5 6 Next
Last modified: September 9, 2013